Cybersecurity Hacking Using Python

 




 

Tay, Elyn Wee Fang (2023) Cybersecurity Hacking Using Python. Final Year Project (Bachelor), Tunku Abdul Rahman University of Management and Technology.

[img] Text
RIS_Elyn Tay Wee Fang_Fulltext.pdf
Restricted to Registered users only

Download (8MB)

Abstract

Unwelcome attempts to steal, expose, alter, disable, or destroy information by unauthorized access to computer systems are known as cyber-attacks. Organizations, state actors, or private individuals launch cyber-attacks for a variety of reasons, including business financial data, client lists, customer financial data, customer databases, including personally identifiable information (PII), and etc. Cyber-attacks have the potential to harm businesses if they are effective. They can result in costly downtime, data loss or modification, and ransom payments. Furthermore, downtime might result in significant service outages as well as financial losses. Purpose: The primary goal of this project is to use Python in order to perform cyber security hacking. This project aims to demonstrate how vulnerable a machine is and how it can be attacked using a variety of tactics and tools such as Kali Linux. To prevent unknown attacks such as zero-day attacks, it is vital to show one the vulnerability of their machine. Scope: The system's purpose is to break into the target's machine and gain access to sensitive information such as username and file passwords. During the course of this project, modules such as port scanning, brute force attack, password hacking, sniffing, flooding and spoofing will be featured. Methodology: Kali Linux, which will serve as the attacker's machine, while Win7 and Metasploit, will serve as the targeted machine, are used in this project. In this project, Python was used to break through the security given by a machine or a computer. Testing criteria used: Self-written Python script will be used in terminal in order to test vulnerabilities such as brute forcing, finding directories, changing MAC address and etc. Results and Conclusion: The targeted machine will be compromised as a result of this project, which attacker will use several types of attacks to make the system vulnerable. In this project, it will be demonstrated that exploiting vulnerabilities can take in many different forms, not only by using SQL Injection, XSS, and other methods.

Item Type: Final Year Project
Subjects: Science > Computer Science
Science > Computer Science > Computer software
Faculties: Faculty of Computing and Information Technology > Bachelor of Information Technology (Honours) in Information Security
Depositing User: Library Staff
Date Deposited: 22 Aug 2023 04:44
Last Modified: 22 Aug 2023 04:44
URI: https://eprints.tarc.edu.my/id/eprint/26074